XYGATE User Authentication Reference Manual

XYGATE
®
User Authentication
Reference Manual
Chapter 19. XUA Auditing and Audit Reports
XYPRO Technology Corporation 183 Proprietary and Confidential
When you are satisfied with all your selection criteria, press Z to create the report and
exit from the macro.
If you press ZP, the macro will generate the report and put you into the PERUSE
program specified by the PERUSE_OBJECT keyword (page 236) in the UACONF file.
When you have examined, printed or written the report to an edit file, and type EXIT,
you will be returned to the Report Selection screen where you may resume report
selection.
To CLOSE the Report Selection screen, select X to return to your TACL prompt.
Note: Prompts will show a default value inside a pair of angle brackets <>. Press
Enter (
) without any input to accept the default value shown.
19.5.1 Audit File
Enter the name of the audit file you want to use to generate the report. If more than
one audit file is shown, the current audit file will be the default value.
XUA will display a list of all the audit files included in the current UACONF file. Old
(rolled-over) audit files will also be displayed. You may also select an audit file that is
not displayed.
To choose an audit file other than the one currently in use, select A.
Example:
Selection? A
You may choose one of the following audit files to report from
$SYSTEM.XYGATEUA
CODE EOF LAST MODIFIED OWNER RWEP PExt SExt
AUD00001 3333 471040 14FEB2004 2:20 222,80 NUUU 300 300
$SYSTEM.XYGATEUA
CODE EOF LAST MODIFIED OWNER RWEP PExt SExt
AUDIT O 3333 569344 04MAR2004 5:15 222,80 NUUU 300 300
$SYSTEM.XYGATEUA
CODE EOF LAST MODIFIED OWNER RWEP PExt SExt
AUDIT1 3333 16384 06FEB2004 5:34 222,80 NUUU 300 300
$SYSTEM.XYGATEUA
Name of audit log <$SYSTEM.XYGATEUA.AUDIT>?